##// END OF EJS Templates
#404 API extensions for showing permission for users...
#404 API extensions for showing permission for users - added permissions to get_user function - added last_login to get_user and get_users function - modified custom JSON encoder to handle non standard python types, like set, OrderedDict, datetime, date

File last commit:

r2129:43481c3d beta
r2151:12ceeda3 beta
Show More
test_models.py
715 lines | 28.3 KiB | text/x-python | PythonLexer
implements #226 repo groups available by path...
r1538 import os
Fixes issue #201...
r1373 import unittest
from rhodecode.tests import *
implements #226 repo groups available by path...
r1538
from rhodecode.model.repos_group import ReposGroupModel
fixes #260 Put repo in group, then move group to another group -> repo becomes unavailable
r1539 from rhodecode.model.repo import RepoModel
Tests updates, Session refactoring
r1713 from rhodecode.model.db import RepoGroup, User, Notification, UserNotification, \
#399 added inheritance of permissions for users group on repos groups
r2129 UsersGroup, UsersGroupMember, Permission, UsersGroupRepoGroupToPerm
implements #226 repo groups available by path...
r1538 from sqlalchemy.exc import IntegrityError
#302 - basic notification system, models+tests
r1702 from rhodecode.model.user import UserModel
Tests updates, Session refactoring
r1713 from rhodecode.model.meta import Session
from rhodecode.model.notification import NotificationModel
from rhodecode.model.users_group import UsersGroupModel
#227 Initial version of repository groups permissions system...
r1982 from rhodecode.lib.auth import AuthUser
def _make_group(path, desc='desc', parent_id=None,
skip_if_exists=False):
gr = RepoGroup.get_by_group_name(path)
if gr and skip_if_exists:
return gr
gr = ReposGroupModel().create(path, desc, parent_id)
return gr
implements #226 repo groups available by path...
r1538
class TestReposGroups(unittest.TestCase):
def setUp(self):
#227 Initial version of repository groups permissions system...
r1982 self.g1 = _make_group('test1', skip_if_exists=True)
fixes issue #366 setting null on parent_group didn't propagate to actually db field....
r2059 Session.commit()
#227 Initial version of repository groups permissions system...
r1982 self.g2 = _make_group('test2', skip_if_exists=True)
fixes issue #366 setting null on parent_group didn't propagate to actually db field....
r2059 Session.commit()
#227 Initial version of repository groups permissions system...
r1982 self.g3 = _make_group('test3', skip_if_exists=True)
fixes issue #366 setting null on parent_group didn't propagate to actually db field....
r2059 Session.commit()
implements #226 repo groups available by path...
r1538
def tearDown(self):
print 'out'
def __check_path(self, *path):
fixes issue #366 setting null on parent_group didn't propagate to actually db field....
r2059 """
Checks the path for existance !
"""
implements #226 repo groups available by path...
r1538 path = [TESTS_TMP_PATH] + list(path)
path = os.path.join(*path)
return os.path.isdir(path)
def _check_folders(self):
print os.listdir(TESTS_TMP_PATH)
def __delete_group(self, id_):
ReposGroupModel().delete(id_)
def __update_group(self, id_, path, desc='desc', parent_id=None):
fixes issue #366 setting null on parent_group didn't propagate to actually db field....
r2059 form_data = dict(
group_name=path,
group_description=desc,
group_parent_id=parent_id,
perms_updates=[],
perms_new=[]
)
implements #226 repo groups available by path...
r1538 gr = ReposGroupModel().update(id_, form_data)
return gr
def test_create_group(self):
#227 Initial version of repository groups permissions system...
r1982 g = _make_group('newGroup')
implements #226 repo groups available by path...
r1538 self.assertEqual(g.full_path, 'newGroup')
self.assertTrue(self.__check_path('newGroup'))
def test_create_same_name_group(self):
#227 Initial version of repository groups permissions system...
r1982 self.assertRaises(IntegrityError, lambda:_make_group('newGroup'))
commit less models...
r1749 Session.rollback()
implements #226 repo groups available by path...
r1538
def test_same_subgroup(self):
#227 Initial version of repository groups permissions system...
r1982 sg1 = _make_group('sub1', parent_id=self.g1.group_id)
implements #226 repo groups available by path...
r1538 self.assertEqual(sg1.parent_group, self.g1)
self.assertEqual(sg1.full_path, 'test1/sub1')
self.assertTrue(self.__check_path('test1', 'sub1'))
#227 Initial version of repository groups permissions system...
r1982 ssg1 = _make_group('subsub1', parent_id=sg1.group_id)
implements #226 repo groups available by path...
r1538 self.assertEqual(ssg1.parent_group, sg1)
self.assertEqual(ssg1.full_path, 'test1/sub1/subsub1')
self.assertTrue(self.__check_path('test1', 'sub1', 'subsub1'))
def test_remove_group(self):
#227 Initial version of repository groups permissions system...
r1982 sg1 = _make_group('deleteme')
implements #226 repo groups available by path...
r1538 self.__delete_group(sg1.group_id)
refactoring of models names for repoGroup permissions
r1633 self.assertEqual(RepoGroup.get(sg1.group_id), None)
implements #226 repo groups available by path...
r1538 self.assertFalse(self.__check_path('deteteme'))
#227 Initial version of repository groups permissions system...
r1982 sg1 = _make_group('deleteme', parent_id=self.g1.group_id)
implements #226 repo groups available by path...
r1538 self.__delete_group(sg1.group_id)
refactoring of models names for repoGroup permissions
r1633 self.assertEqual(RepoGroup.get(sg1.group_id), None)
implements #226 repo groups available by path...
r1538 self.assertFalse(self.__check_path('test1', 'deteteme'))
def test_rename_single_group(self):
#227 Initial version of repository groups permissions system...
r1982 sg1 = _make_group('initial')
implements #226 repo groups available by path...
r1538
new_sg1 = self.__update_group(sg1.group_id, 'after')
self.assertTrue(self.__check_path('after'))
refactoring of models names for repoGroup permissions
r1633 self.assertEqual(RepoGroup.get_by_group_name('initial'), None)
implements #226 repo groups available by path...
r1538
def test_update_group_parent(self):
#227 Initial version of repository groups permissions system...
r1982 sg1 = _make_group('initial', parent_id=self.g1.group_id)
implements #226 repo groups available by path...
r1538
new_sg1 = self.__update_group(sg1.group_id, 'after', parent_id=self.g1.group_id)
self.assertTrue(self.__check_path('test1', 'after'))
refactoring of models names for repoGroup permissions
r1633 self.assertEqual(RepoGroup.get_by_group_name('test1/initial'), None)
implements #226 repo groups available by path...
r1538
new_sg1 = self.__update_group(sg1.group_id, 'after', parent_id=self.g3.group_id)
self.assertTrue(self.__check_path('test3', 'after'))
refactoring of models names for repoGroup permissions
r1633 self.assertEqual(RepoGroup.get_by_group_name('test3/initial'), None)
implements #226 repo groups available by path...
r1538
new_sg1 = self.__update_group(sg1.group_id, 'hello')
self.assertTrue(self.__check_path('hello'))
refactoring of models names for repoGroup permissions
r1633 self.assertEqual(RepoGroup.get_by_group_name('hello'), new_sg1)
implements #226 repo groups available by path...
r1538
fixes #260 Put repo in group, then move group to another group -> repo becomes unavailable
r1539 def test_subgrouping_with_repo(self):
#227 Initial version of repository groups permissions system...
r1982 g1 = _make_group('g1')
g2 = _make_group('g2')
fixes #260 Put repo in group, then move group to another group -> repo becomes unavailable
r1539
# create new repo
form_data = dict(repo_name='john',
repo_name_full='john',
fork_name=None,
description=None,
repo_group=None,
private=False,
repo_type='hg',
clone_uri=None)
cur_user = User.get_by_username(TEST_USER_ADMIN_LOGIN)
r = RepoModel().create(form_data, cur_user)
self.assertEqual(r.repo_name, 'john')
# put repo into group
form_data = form_data
form_data['repo_group'] = g1.group_id
form_data['perms_new'] = []
form_data['perms_updates'] = []
RepoModel().update(r.repo_name, form_data)
self.assertEqual(r.repo_name, 'g1/john')
self.__update_group(g1.group_id, 'g1', parent_id=g2.group_id)
self.assertTrue(self.__check_path('g2', 'g1'))
# test repo
self.assertEqual(r.repo_name, os.path.join('g2', 'g1', r.just_name))
#227 Initial version of repository groups permissions system...
r1982
fixes issue #366 setting null on parent_group didn't propagate to actually db field....
r2059 def test_move_to_root(self):
g1 = _make_group('t11')
Session.commit()
g2 = _make_group('t22',parent_id=g1.group_id)
Session.commit()
added tests for users_group and issue #373
r2064
fixes issue #366 setting null on parent_group didn't propagate to actually db field....
r2059 self.assertEqual(g2.full_path,'t11/t22')
self.assertTrue(self.__check_path('t11', 't22'))
added tests for users_group and issue #373
r2064
fixes issue #366 setting null on parent_group didn't propagate to actually db field....
r2059 g2 = self.__update_group(g2.group_id, 'g22', parent_id=None)
Session.commit()
added tests for users_group and issue #373
r2064
fixes issue #366 setting null on parent_group didn't propagate to actually db field....
r2059 self.assertEqual(g2.group_name,'g22')
# we moved out group from t1 to '' so it's full path should be 'g2'
self.assertEqual(g2.full_path,'g22')
self.assertFalse(self.__check_path('t11', 't22'))
self.assertTrue(self.__check_path('g22'))
added tests for users_group and issue #373
r2064
fixes issue #366 setting null on parent_group didn't propagate to actually db field....
r2059
Tests updates, Session refactoring
r1713 class TestUser(unittest.TestCase):
fixed repo_create permission by adding missing commit statements...
r1758 def __init__(self, methodName='runTest'):
Session.remove()
super(TestUser, self).__init__(methodName=methodName)
auto white-space removal
r1818
Tests updates, Session refactoring
r1713 def test_create_and_remove(self):
usr = UserModel().create_or_update(username=u'test_user', password=u'qweqwe',
email=u'u232@rhodecode.org',
name=u'u1', lastname=u'u1')
commit less models...
r1749 Session.commit()
Tests updates, Session refactoring
r1713 self.assertEqual(User.get_by_username(u'test_user'), usr)
# make users group
another major refactoring with session management
r1734 users_group = UsersGroupModel().create('some_example_group')
commit less models...
r1749 Session.commit()
another major refactoring with session management
r1734
Tests updates, Session refactoring
r1713 UsersGroupModel().add_user_to_group(users_group, usr)
commit less models...
r1749 Session.commit()
Tests updates, Session refactoring
r1713
self.assertEqual(UsersGroup.get(users_group.users_group_id), users_group)
self.assertEqual(UsersGroupMember.query().count(), 1)
UserModel().delete(usr.user_id)
commit less models...
r1749 Session.commit()
Tests updates, Session refactoring
r1713
self.assertEqual(UsersGroupMember.query().all(), [])
fixes #260 Put repo in group, then move group to another group -> repo becomes unavailable
r1539
#302 - basic notification system, models+tests
r1702 class TestNotifications(unittest.TestCase):
Tests updates, Session refactoring
r1713 def __init__(self, methodName='runTest'):
fixed repo_create permission by adding missing commit statements...
r1758 Session.remove()
Tests updates, Session refactoring
r1713 self.u1 = UserModel().create_or_update(username=u'u1',
password=u'qweqwe',
email=u'u1@rhodecode.org',
another major refactoring with session management
r1734 name=u'u1', lastname=u'u1')
Session.commit()
self.u1 = self.u1.user_id
Tests updates, Session refactoring
r1713 self.u2 = UserModel().create_or_update(username=u'u2',
password=u'qweqwe',
email=u'u2@rhodecode.org',
another major refactoring with session management
r1734 name=u'u2', lastname=u'u3')
Session.commit()
self.u2 = self.u2.user_id
Tests updates, Session refactoring
r1713 self.u3 = UserModel().create_or_update(username=u'u3',
password=u'qweqwe',
email=u'u3@rhodecode.org',
another major refactoring with session management
r1734 name=u'u3', lastname=u'u3')
Session.commit()
self.u3 = self.u3.user_id
Tests updates, Session refactoring
r1713 super(TestNotifications, self).__init__(methodName=methodName)
#302 - basic notification system, models+tests
r1702
Tests updates, Session refactoring
r1713 def _clean_notifications(self):
for n in Notification.query().all():
commit less models...
r1749 Session.delete(n)
Tests updates, Session refactoring
r1713
commit less models...
r1749 Session.commit()
Tests updates, Session refactoring
r1713 self.assertEqual(Notification.query().all(), [])
#302 - basic notification system, models+tests
r1702
fixed repo_create permission by adding missing commit statements...
r1758 def tearDown(self):
self._clean_notifications()
#302 - basic notification system, models+tests
r1702
def test_create_notification(self):
Tests updates, Session refactoring
r1713 self.assertEqual([], Notification.query().all())
self.assertEqual([], UserNotification.query().all())
#302 - basic notification system, models+tests
r1702 usrs = [self.u1, self.u2]
Tests updates, Session refactoring
r1713 notification = NotificationModel().create(created_by=self.u1,
Notification system improvements...
r1712 subject=u'subj', body=u'hi there',
fixed tests
r1709 recipients=usrs)
commit less models...
r1749 Session.commit()
Tests updates, Session refactoring
r1713 u1 = User.get(self.u1)
u2 = User.get(self.u2)
u3 = User.get(self.u3)
Notification system improvements...
r1712 notifications = Notification.query().all()
self.assertEqual(len(notifications), 1)
#302 - basic notification system, models+tests
r1702 unotification = UserNotification.query()\
.filter(UserNotification.notification == notification).all()
Notification system improvements...
r1712
Tests updates, Session refactoring
r1713 self.assertEqual(notifications[0].recipients, [u1, u2])
fixed tests
r1709 self.assertEqual(notification.notification_id,
notifications[0].notification_id)
#302 - basic notification system, models+tests
r1702 self.assertEqual(len(unotification), len(usrs))
Tests updates, Session refactoring
r1713 self.assertEqual([x.user.user_id for x in unotification], usrs)
#302 - basic notification system, models+tests
r1702 def test_user_notifications(self):
Tests updates, Session refactoring
r1713 self.assertEqual([], Notification.query().all())
self.assertEqual([], UserNotification.query().all())
notification1 = NotificationModel().create(created_by=self.u1,
subject=u'subj', body=u'hi there1',
fixed tests
r1709 recipients=[self.u3])
commit less models...
r1749 Session.commit()
Tests updates, Session refactoring
r1713 notification2 = NotificationModel().create(created_by=self.u1,
subject=u'subj', body=u'hi there2',
fixed tests
r1709 recipients=[self.u3])
commit less models...
r1749 Session.commit()
u3 = Session.query(User).get(self.u3)
Tests updates, Session refactoring
r1713
self.assertEqual(sorted([x.notification for x in u3.notifications]),
sorted([notification2, notification1]))
#302 - basic notification system, models+tests
r1702
def test_delete_notifications(self):
Tests updates, Session refactoring
r1713 self.assertEqual([], Notification.query().all())
self.assertEqual([], UserNotification.query().all())
notification = NotificationModel().create(created_by=self.u1,
Notification system improvements...
r1712 subject=u'title', body=u'hi there3',
fixed tests
r1709 recipients=[self.u3, self.u1, self.u2])
commit less models...
r1749 Session.commit()
#302 - basic notification system, models+tests
r1702 notifications = Notification.query().all()
self.assertTrue(notification in notifications)
Notification.delete(notification.notification_id)
commit less models...
r1749 Session.commit()
#302 - basic notification system, models+tests
r1702
notifications = Notification.query().all()
self.assertFalse(notification in notifications)
un = UserNotification.query().filter(UserNotification.notification
== notification).all()
self.assertEqual(un, [])
Tests updates, Session refactoring
r1713
def test_delete_association(self):
self.assertEqual([], Notification.query().all())
self.assertEqual([], UserNotification.query().all())
notification = NotificationModel().create(created_by=self.u1,
subject=u'title', body=u'hi there3',
recipients=[self.u3, self.u1, self.u2])
commit less models...
r1749 Session.commit()
Tests updates, Session refactoring
r1713
unotification = UserNotification.query()\
.filter(UserNotification.notification ==
notification)\
.filter(UserNotification.user_id == self.u3)\
.scalar()
self.assertEqual(unotification.user_id, self.u3)
NotificationModel().delete(self.u3,
notification.notification_id)
commit less models...
r1749 Session.commit()
Tests updates, Session refactoring
r1713
fixed bug with eager deletes in notifications...
r1733 u3notification = UserNotification.query()\
Tests updates, Session refactoring
r1713 .filter(UserNotification.notification ==
notification)\
.filter(UserNotification.user_id == self.u3)\
.scalar()
fixed bug with eager deletes in notifications...
r1733 self.assertEqual(u3notification, None)
# notification object is still there
self.assertEqual(Notification.query().all(), [notification])
#u1 and u2 still have assignments
u1notification = UserNotification.query()\
.filter(UserNotification.notification ==
notification)\
.filter(UserNotification.user_id == self.u1)\
.scalar()
self.assertNotEqual(u1notification, None)
u2notification = UserNotification.query()\
.filter(UserNotification.notification ==
notification)\
.filter(UserNotification.user_id == self.u2)\
.scalar()
self.assertNotEqual(u2notification, None)
Tests updates, Session refactoring
r1713 def test_notification_counter(self):
self._clean_notifications()
self.assertEqual([], Notification.query().all())
self.assertEqual([], UserNotification.query().all())
NotificationModel().create(created_by=self.u1,
subject=u'title', body=u'hi there_delete',
recipients=[self.u3, self.u1])
commit less models...
r1749 Session.commit()
Tests updates, Session refactoring
r1713
self.assertEqual(NotificationModel()
.get_unread_cnt_for_user(self.u1), 1)
self.assertEqual(NotificationModel()
.get_unread_cnt_for_user(self.u2), 0)
self.assertEqual(NotificationModel()
.get_unread_cnt_for_user(self.u3), 1)
notification = NotificationModel().create(created_by=self.u1,
subject=u'title', body=u'hi there3',
recipients=[self.u3, self.u1, self.u2])
commit less models...
r1749 Session.commit()
Tests updates, Session refactoring
r1713
self.assertEqual(NotificationModel()
.get_unread_cnt_for_user(self.u1), 2)
self.assertEqual(NotificationModel()
.get_unread_cnt_for_user(self.u2), 1)
self.assertEqual(NotificationModel()
.get_unread_cnt_for_user(self.u3), 2)
fixed repo_create permission by adding missing commit statements...
r1758
#227 Initial version of repository groups permissions system...
r1982
fixed repo_create permission by adding missing commit statements...
r1758 class TestUsers(unittest.TestCase):
def __init__(self, methodName='runTest'):
super(TestUsers, self).__init__(methodName=methodName)
def setUp(self):
self.u1 = UserModel().create_or_update(username=u'u1',
password=u'qweqwe',
email=u'u1@rhodecode.org',
auto white-space removal
r1818 name=u'u1', lastname=u'u1')
fixed repo_create permission by adding missing commit statements...
r1758
def tearDown(self):
perm = Permission.query().all()
for p in perm:
UserModel().revoke_perm(self.u1, p)
auto white-space removal
r1818
fixed repo_create permission by adding missing commit statements...
r1758 UserModel().delete(self.u1)
Session.commit()
def test_add_perm(self):
perm = Permission.query().all()[0]
UserModel().grant_perm(self.u1, perm)
Session.commit()
self.assertEqual(UserModel().has_perm(self.u1, perm), True)
def test_has_perm(self):
perm = Permission.query().all()
for p in perm:
has_p = UserModel().has_perm(self.u1, p)
self.assertEqual(False, has_p)
def test_revoke_perm(self):
perm = Permission.query().all()[0]
UserModel().grant_perm(self.u1, perm)
Session.commit()
self.assertEqual(UserModel().has_perm(self.u1, perm), True)
#revoke
UserModel().revoke_perm(self.u1, perm)
Session.commit()
#227 Initial version of repository groups permissions system...
r1982 self.assertEqual(UserModel().has_perm(self.u1, perm), False)
class TestPermissions(unittest.TestCase):
def __init__(self, methodName='runTest'):
super(TestPermissions, self).__init__(methodName=methodName)
def setUp(self):
self.u1 = UserModel().create_or_update(
username=u'u1', password=u'qweqwe',
email=u'u1@rhodecode.org', name=u'u1', lastname=u'u1'
)
fixed #397 Private repository groups shows up before login...
r2124 self.u2 = UserModel().create_or_update(
username=u'u2', password=u'qweqwe',
email=u'u2@rhodecode.org', name=u'u2', lastname=u'u2'
)
self.anon = User.get_by_username('default')
#227 Initial version of repository groups permissions system...
r1982 self.a1 = UserModel().create_or_update(
username=u'a1', password=u'qweqwe',
email=u'a1@rhodecode.org', name=u'a1', lastname=u'a1', admin=True
)
Session.commit()
def tearDown(self):
fixed #397 Private repository groups shows up before login...
r2124 if hasattr(self, 'test_repo'):
RepoModel().delete(repo=self.test_repo)
#227 Initial version of repository groups permissions system...
r1982 UserModel().delete(self.u1)
fixed #397 Private repository groups shows up before login...
r2124 UserModel().delete(self.u2)
#227 Initial version of repository groups permissions system...
r1982 UserModel().delete(self.a1)
if hasattr(self, 'g1'):
ReposGroupModel().delete(self.g1.group_id)
if hasattr(self, 'g2'):
ReposGroupModel().delete(self.g2.group_id)
if hasattr(self, 'ug1'):
UsersGroupModel().delete(self.ug1, force=True)
Session.commit()
def test_default_perms_set(self):
u1_auth = AuthUser(user_id=self.u1.user_id)
perms = {
'repositories_groups': {},
'global': set([u'hg.create.repository', u'repository.read',
u'hg.register.manual_activate']),
'repositories': {u'vcs_test_hg': u'repository.read'}
}
self.assertEqual(u1_auth.permissions['repositories'][HG_REPO],
perms['repositories'][HG_REPO])
new_perm = 'repository.write'
RepoModel().grant_user_permission(repo=HG_REPO, user=self.u1, perm=new_perm)
Session.commit()
u1_auth = AuthUser(user_id=self.u1.user_id)
self.assertEqual(u1_auth.permissions['repositories'][HG_REPO], new_perm)
def test_default_admin_perms_set(self):
a1_auth = AuthUser(user_id=self.a1.user_id)
perms = {
'repositories_groups': {},
'global': set([u'hg.admin']),
'repositories': {u'vcs_test_hg': u'repository.admin'}
}
self.assertEqual(a1_auth.permissions['repositories'][HG_REPO],
perms['repositories'][HG_REPO])
new_perm = 'repository.write'
RepoModel().grant_user_permission(repo=HG_REPO, user=self.a1, perm=new_perm)
Session.commit()
# cannot really downgrade admins permissions !? they still get's set as
# admin !
u1_auth = AuthUser(user_id=self.a1.user_id)
self.assertEqual(u1_auth.permissions['repositories'][HG_REPO],
perms['repositories'][HG_REPO])
def test_default_group_perms(self):
self.g1 = _make_group('test1', skip_if_exists=True)
self.g2 = _make_group('test2', skip_if_exists=True)
u1_auth = AuthUser(user_id=self.u1.user_id)
perms = {
'repositories_groups': {u'test1': 'group.read', u'test2': 'group.read'},
'global': set([u'hg.create.repository', u'repository.read', u'hg.register.manual_activate']),
'repositories': {u'vcs_test_hg': u'repository.read'}
}
self.assertEqual(u1_auth.permissions['repositories'][HG_REPO],
perms['repositories'][HG_REPO])
self.assertEqual(u1_auth.permissions['repositories_groups'],
perms['repositories_groups'])
def test_default_admin_group_perms(self):
self.g1 = _make_group('test1', skip_if_exists=True)
self.g2 = _make_group('test2', skip_if_exists=True)
a1_auth = AuthUser(user_id=self.a1.user_id)
perms = {
'repositories_groups': {u'test1': 'group.admin', u'test2': 'group.admin'},
'global': set(['hg.admin']),
'repositories': {u'vcs_test_hg': 'repository.admin'}
}
self.assertEqual(a1_auth.permissions['repositories'][HG_REPO],
perms['repositories'][HG_REPO])
self.assertEqual(a1_auth.permissions['repositories_groups'],
perms['repositories_groups'])
def test_propagated_permission_from_users_group(self):
# make group
self.ug1 = UsersGroupModel().create('G1')
# add user to group
UsersGroupModel().add_user_to_group(self.ug1, self.u1)
# set permission to lower
new_perm = 'repository.none'
RepoModel().grant_user_permission(repo=HG_REPO, user=self.u1, perm=new_perm)
Session.commit()
u1_auth = AuthUser(user_id=self.u1.user_id)
self.assertEqual(u1_auth.permissions['repositories'][HG_REPO],
new_perm)
# grant perm for group this should override permission from user
new_perm = 'repository.write'
RepoModel().grant_users_group_permission(repo=HG_REPO,
group_name=self.ug1,
perm=new_perm)
# check perms
u1_auth = AuthUser(user_id=self.u1.user_id)
perms = {
'repositories_groups': {},
'global': set([u'hg.create.repository', u'repository.read',
u'hg.register.manual_activate']),
'repositories': {u'vcs_test_hg': u'repository.read'}
}
self.assertEqual(u1_auth.permissions['repositories'][HG_REPO],
new_perm)
self.assertEqual(u1_auth.permissions['repositories_groups'],
perms['repositories_groups'])
def test_propagated_permission_from_users_group_lower_weight(self):
# make group
self.ug1 = UsersGroupModel().create('G1')
# add user to group
UsersGroupModel().add_user_to_group(self.ug1, self.u1)
# set permission to lower
new_perm_h = 'repository.write'
RepoModel().grant_user_permission(repo=HG_REPO, user=self.u1,
perm=new_perm_h)
Session.commit()
u1_auth = AuthUser(user_id=self.u1.user_id)
self.assertEqual(u1_auth.permissions['repositories'][HG_REPO],
new_perm_h)
# grant perm for group this should NOT override permission from user
# since it's lower than granted
new_perm_l = 'repository.read'
RepoModel().grant_users_group_permission(repo=HG_REPO,
group_name=self.ug1,
perm=new_perm_l)
# check perms
u1_auth = AuthUser(user_id=self.u1.user_id)
perms = {
'repositories_groups': {},
'global': set([u'hg.create.repository', u'repository.read',
u'hg.register.manual_activate']),
'repositories': {u'vcs_test_hg': u'repository.write'}
}
self.assertEqual(u1_auth.permissions['repositories'][HG_REPO],
new_perm_h)
self.assertEqual(u1_auth.permissions['repositories_groups'],
perms['repositories_groups'])
fixed #397 Private repository groups shows up before login...
r2124
def test_repo_in_group_permissions(self):
self.g1 = _make_group('group1', skip_if_exists=True)
self.g2 = _make_group('group2', skip_if_exists=True)
Session.commit()
# both perms should be read !
u1_auth = AuthUser(user_id=self.u1.user_id)
self.assertEqual(u1_auth.permissions['repositories_groups'],
{u'group1': u'group.read', u'group2': u'group.read'})
a1_auth = AuthUser(user_id=self.anon.user_id)
self.assertEqual(a1_auth.permissions['repositories_groups'],
{u'group1': u'group.read', u'group2': u'group.read'})
#Change perms to none for both groups
ReposGroupModel().grant_user_permission(repos_group=self.g1,
user=self.anon,
perm='group.none')
ReposGroupModel().grant_user_permission(repos_group=self.g2,
user=self.anon,
perm='group.none')
#399 added inheritance of permissions for users group on repos groups
r2129
fixed #397 Private repository groups shows up before login...
r2124 u1_auth = AuthUser(user_id=self.u1.user_id)
self.assertEqual(u1_auth.permissions['repositories_groups'],
{u'group1': u'group.none', u'group2': u'group.none'})
a1_auth = AuthUser(user_id=self.anon.user_id)
self.assertEqual(a1_auth.permissions['repositories_groups'],
{u'group1': u'group.none', u'group2': u'group.none'})
# add repo to group
form_data = {
'repo_name':HG_REPO,
'repo_name_full':os.path.join(self.g1.group_name,HG_REPO),
'repo_type':'hg',
'clone_uri':'',
'repo_group':self.g1.group_id,
'description':'desc',
'private':False
}
self.test_repo = RepoModel().create(form_data, cur_user=self.u1)
Session.commit()
u1_auth = AuthUser(user_id=self.u1.user_id)
self.assertEqual(u1_auth.permissions['repositories_groups'],
{u'group1': u'group.none', u'group2': u'group.none'})
a1_auth = AuthUser(user_id=self.anon.user_id)
self.assertEqual(a1_auth.permissions['repositories_groups'],
{u'group1': u'group.none', u'group2': u'group.none'})
#grant permission for u2 !
ReposGroupModel().grant_user_permission(repos_group=self.g1,
user=self.u2,
perm='group.read')
ReposGroupModel().grant_user_permission(repos_group=self.g2,
user=self.u2,
perm='group.read')
Session.commit()
self.assertNotEqual(self.u1, self.u2)
#u1 and anon should have not change perms while u2 should !
u1_auth = AuthUser(user_id=self.u1.user_id)
self.assertEqual(u1_auth.permissions['repositories_groups'],
{u'group1': u'group.none', u'group2': u'group.none'})
u2_auth = AuthUser(user_id=self.u2.user_id)
self.assertEqual(u2_auth.permissions['repositories_groups'],
{u'group1': u'group.read', u'group2': u'group.read'})
a1_auth = AuthUser(user_id=self.anon.user_id)
self.assertEqual(a1_auth.permissions['repositories_groups'],
{u'group1': u'group.none', u'group2': u'group.none'})
#399 added inheritance of permissions for users group on repos groups
r2129
def test_repo_group_user_as_user_group_member(self):
# create Group1
self.g1 = _make_group('group1', skip_if_exists=True)
Session.commit()
a1_auth = AuthUser(user_id=self.anon.user_id)
self.assertEqual(a1_auth.permissions['repositories_groups'],
{u'group1': u'group.read'})
# set default permission to none
ReposGroupModel().grant_user_permission(repos_group=self.g1,
user=self.anon,
perm='group.none')
# make group
self.ug1 = UsersGroupModel().create('G1')
# add user to group
UsersGroupModel().add_user_to_group(self.ug1, self.u1)
Session.commit()
# check if user is in the group
membrs = [x.user_id for x in UsersGroupModel().get(self.ug1.users_group_id).members]
self.assertEqual(membrs, [self.u1.user_id])
# add some user to that group
# check his permissions
a1_auth = AuthUser(user_id=self.anon.user_id)
self.assertEqual(a1_auth.permissions['repositories_groups'],
{u'group1': u'group.none'})
u1_auth = AuthUser(user_id=self.u1.user_id)
self.assertEqual(u1_auth.permissions['repositories_groups'],
{u'group1': u'group.none'})
# grant ug1 read permissions for
ReposGroupModel().grant_users_group_permission(repos_group=self.g1,
group_name=self.ug1,
perm='group.read')
Session.commit()
# check if the
obj = Session.query(UsersGroupRepoGroupToPerm)\
.filter(UsersGroupRepoGroupToPerm.group == self.g1)\
.filter(UsersGroupRepoGroupToPerm.users_group == self.ug1)\
.scalar()
self.assertEqual(obj.permission.permission_name, 'group.read')
a1_auth = AuthUser(user_id=self.anon.user_id)
self.assertEqual(a1_auth.permissions['repositories_groups'],
{u'group1': u'group.none'})
u1_auth = AuthUser(user_id=self.u1.user_id)
self.assertEqual(u1_auth.permissions['repositories_groups'],
{u'group1': u'group.read'})